Significant Data Breaches – February 2015

Significant Data Breaches – February 2015

It seems that each week we read about a new attack on a major enterprise or government agency. February was no different. Below…

New eBook: “Beyond the Kill Chain”

New eBook: “Beyond the Kill Chain”

The Kill Chain can play an important part of any organization or agency’s cyber defenses however it’s a very reactive approach. In our…

Webinar Recording: Arming your team with big data analytics & threat intelligence

Webinar Recording: Arming your team with big data analytics & threat intelligence

IKANOW and 451 Research hosted a webinar about arming your team with big data analytics & threat intelligence to effectively fight cyber…

Significant Data Breaches – January 2015

Significant Data Breaches – January 2015

While 2014 was “the year of the data breach”, 2015 is off to a fast start with several prominent data breaches. Below…

A Two-Pronged Approach to the Critical Shortage of Cyber Security Analysts

A Two-Pronged Approach to the Critical Shortage of Cyber Security Analysts

Cyber security is among the biggest challenges facing businesses in the 21st century and the situation is compounded by an alarming shortage…

Significant Data Breaches – December 2014

Significant Data Breaches – December 2014

Happy New Year! What better way to kick off the New Year than by talking about recent data breaches? OK, there are…

CISO’s Top Concerns for 2015

CISO’s Top Concerns for 2015

Almost a year has passed since Target experienced a massive data breach yet the company is still feeling pain over the problem:…

Top 10 Global Data Breaches of 2014

Top 10 Global Data Breaches of 2014

From Home Depot and USPS to NOAA and State Department, there’s news about a new data breach on a weekly, if not daily, basis. These breaches…

Open Analytics Cyber Summit Recap

Open Analytics Cyber Summit Recap

IKANOW hosted another hugely successful Open Analytics Summit, this time with a focus on cyber security. This was our 5th summit in…

The Cyber Security Landscape and why CISOs are Investing in Threat Intelligence

The Cyber Security Landscape and why CISOs are Investing in Threat Intelligence

As Security Becomes a Boardroom Topic, CISOs Seeking Tools to See the Big Picture Required to Prioritize Risks and Align with Business…

123